Across the world, organizations have teams gathering threat data to protect themselves from incoming cyber attacks and maintain a strong cyber security posture. Teams are also sharing information, because along with the data collected internally, organizations need external information to have a comprehensive view of the threat landscape. The information… (More)

This paper compares two methods to estimate the position of a mobile robot in an indoor environment using only odometric calculus and the WiFi energy received from the wireless communication infrastructure. In both cases we use a well-known probabilistic method based on the Bayes rule to accumulate localization probability as the robot moves on with an… (More)

The need for more fluent information sharing has been recognized for years as a major requirement by the cyber security community. Information sharing at present is mostly a slow, inefficient, and manual process that in many cases uses non-structured data sources. It is true that several cyber security data sharing tools have emerged and are currently… (More)